Securing Software Architectures for Trusted Processor Environments
نویسنده
چکیده
Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Jan-Erik Ekberg Name of the doctoral dissertation Securing Software Architectures for Trusted Processor Environments Publisher School of Science Unit Computer Science and Engineering Series Aalto University publication series DOCTORAL DISSERTATIONS 75/2013 Field of research Platform Security Manuscript submitted 23 January 2013 Date of the defence 24 May 2013 Permission to publish granted (date) 12 March 2013 Language English Monograph Article dissertation (summary + original articles)
منابع مشابه
Securing Medical SaaS solutions using a Novel End-to-End Encryption Protocol
E-Health solutions using the Internet provide many benefits for health centers; hosting such solutions in public Cloud Computing environments as Software-as-a-Service becomes increasingly popular. However, the deployment of e-health services in shared environments is restricted due to regulations prohibiting medical data access by illegitimate parties, such as cloud computing intermediaries. A ...
متن کاملSecurity Verification of Secure Processor Architectures and Systems
In the last decade, a number of secure processor architectures have been proposed in academia, and now some are available in consumer products, such as Intel’s SGX or AMD’s SEV. However, most, if not all, of the designs are not thoroughly security verified, bringing into question the security of these architectures, and systems built around them. To address this issue, in this paper we present ...
متن کاملOn Making Emerging Trusted Execution Environments Accessible to Developers
New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions. But each new TEE environment comes with its own set of interfaces and programming paradigms, thus raising the barrier for entry for developers who want to make use of these TEEs. ...
متن کاملA Security Assessment of Trusted Platform Modules
Trusted Platform Modules (TPMs) are becoming ubiquitous devices included in newly released personal computers. Broadly speaking, the aim of this technology is to provide a facility for authenticating the platform on which they are running: they are able to measure attest to the authenticity of a hardware and software configuration. Designed to be cheap, commodity devices which motherboard and p...
متن کاملTrusted P2P computing environments with role-based access control
A P2P computing environment can be an ideal platform for resource-sharing services in an organisation if it provides trust mechanisms. Current P2P technologies offer content-sharing services for non-sensitive public domains in the absence of trust mechanisms. The lack of sophisticated trust mechanisms in the current P2P environment has become a serious constraint for broader applications of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013